- Cybersecurity Threats,Malware Trends,and Strategies
- Tim Rains
- 228字
- 2021-06-30 14:49:10
Preface
Imagine you are in a submarine, submerged miles below the surface surrounded by dark, freezing water. The hull of the submarine is under constant immense pressure from all directions. A single mistake in the design, construction or operation of the submarine spells disaster for it and its entire crew.
This is analogous to the challenge Chief Information Security Officers (CISOs) and their teams face today. Their organizations are surrounded on the internet by attackers that are constantly probing for ways to penetrate and compromise their organization's IT infrastructure. The people in their organizations receive wave after wave of social engineering attacks designed to trick them into making poor trust decisions that will undermine the controls that their security teams have implemented. The specters of ransomware and data breaches continue to haunt CISOs, Chief Information Officers (CIOs) and Chief Technology Officers (CTOs) of the most sophisticated organizations in the world.
After conducting hundreds of incident response investigations and publishing thousands of pages of threat intelligence, I have had the opportunity to learn from and advise literally thousands of businesses and public sector organizations all over the world. I wrote this book to share some of the insights and lessons I've learned during this extraordinary journey.
The views and opinions expressed in this book are my own and not those of my past or present employers.
- 云原生安全:攻防實踐與體系構(gòu)建
- Extending Symfony2 Web Application Framework
- 可信計算3.0工程初步
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- INSTANT Burp Suite Starter
- 開發(fā)者的Web安全戒律:真實威脅與防御實踐
- 計算機病毒分析與防范大全(第3版)
- 安全實戰(zhàn)之滲透測試
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實踐
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Mastering Reverse Engineering
- 信息系統(tǒng)安全等級化保護原理與實踐
- Practical Internet of Things Security
- Blockchain Development with Hyperledger
- 智能制造的信息安全